Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


WhiteHat and Bugcrowd Offer Pen Test Service

by WhiteHat SecurityJun 12, 2020

The WhiteHat Pen Test Service is a comprehensive application security testing bundle which includes WhiteHat's industry proven Sentinel Dynamic for complete web application security and Bugcrowd's unique crowdsourced pen test performed by their security experts to find high priority vulnerabilities and help organizations meet key compliance requirements.

Risk-Based Vulnerability Management: The Best Way to Prioritize

by TenableJun 05, 2020

Everyone in security knows that there are no guarantees against breaches, so a proactive defensible approach is the next best thing. The easiest way to do that? Risk-based vulnerability management. Download this whitepaper to learn how to prioritize the real threats to the business.

SANS Whitepaper: Practical Industrial Control System Cybersecurity

by TenableJun 05, 2020

Based on a recent Industrial IoT security conducted by SANS, the use and benefits derived from information technology (IT) and operational technology (OT) convergence are growing and enabling more effective management and operation of contemporary control systems.

This paper explores the issues that arise with the blending of IT and OT where risk must be identified and managed. Download this whitepaper to learn how to make more informed decisions about how to build stronger cybersecurity

Headline Vulnerabilities: How Media Coverage Shapes the Perception of Risk

by TenableJun 05, 2020

Newsworthy vulnerabilities can become a reputational and customer service issue for organizations if and when they are exploited. Read this report to hear what chief information security officers (CISOs) and security analysts had to say about whether and how media coverage of vulnerabilities impacted their work.

Case Study: Validating Security & Reducing Risk

by MandiantMay 29, 2020

The case study explores how one of the largest healthcare providers in the U.S. validates security protocols and protects critical assets with an effective security validation program that utilizes automation and an intelligence-driven approach to mitigate risk, optimize controls, and communicate value.

This case study and accompanying video covers: The challenges of cybersecurity for healthcare organizations Measuring and monitoring the efficacy of security tools Reducing cyber risk

Case Study: Continuously Validate Cybersecurity Controls

by MandiantMay 15, 2020

Are you able to get evidence-based data to show progress and improvements in your cybersecurity strategy?

Read this case study to understand how Mandiant Security Validation (formerly Verodin), empowers leading financial services organization Torchmark Corporation to continuously validate cybersecurity controls and realize improvements in key areas such as: People and process conditioning Communicating the effectiveness of security controls Real-time insights into environmental drift

Simplify InfoSec Risk and Compliance

by ReciprocityApr 30, 2020

Managing risk, compliance, and audit processes is complex and resource intensive. Without a centralized platform, audit cycles are longer, visibility into overall risk posture is lacking, and reporting is inefficient. Many companies delay implementing a GRC solution, fearing it to be too costly or challenging--but it doesn't have to be.

Download this whitepaper to learn how you can:
• Automate evidence collection
• Reduce manual effort and shorten audit cycles

Supercharging SIEM Solutions With Threat Intelligence

by Recorded FutureApr 20, 2020

Security information and event management (SIEM) technologies are essential tools for security operations teams to collect, correlate, and analyze security event logs across their network environments.

But every organization's attack surface is growing these days. For SIEM users, that's creating some big challenges, such as an information overload from too many alerts and the need to do additional, painstaking manual research to make up for a lack of context in sources of information

2020 SANS Cyber Threat Intelligence (CTI) Survey

by Recorded FutureApr 20, 2020

Organizations of all sizes are embracing intelligence as a critical security function to expose unknown threats, inform better decisions, and accelerate risk reduction.

This new survey from the SANS Institute explores how cyber threat intelligence has evolved over the last year. Download the results to examine current trends and find out: How to measure your intelligence program's effectiveness Which processes and tools best support collaborative CTI efforts What types of

Security Intelligence: Driving Security From Analytics to Action

by Recorded FutureApr 20, 2020

To drive down risk while achieving meaningful operational outcomes, intelligence must be embedded into the core of every security workflow, function, and decision. This requires a unified approach for collecting, analyzing, and automating data and insights.

At Recorded Future, security intelligence is more than a methodology - it's a mindset, a philosophy for empowering their clients with the intelligence necessary to drive every security initiative and strategic decision.



Today's business world requires security validation. Without data-driven evidence that validates security effectiveness, companies operate on assumptions and are at risk of an attack. Through automated, continuous monitoring and measurement against real-world attack behaviors, Mandiant Security Validation (formerly Verodin) enables organizations to achieve optimal cybersecurity performance through ongoing assessment, optimization and rationalization.


Founded in 2009, Reciprocity has reimagined bulky legacy GRC software to meet the demands of today's dynamic data-driven ecosystem. The company is recognized for its forward-thinking cloud platform, ZenGRC, that elevates risk, compliance, and audit from a burdensome expense to a strategic advantage. Reciprocity has U.S. headquarters in San Francisco and global offices in Ljubljana, Slovenia, and Argentina.

Recorded Future

Recorded Future arms security teams with the only complete security intelligence solution powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context in real time and packaged for human analysis or integration with security technologies.


Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Tenable Network Security's family of products includes SecurityCenter Continuous View and Nessus.

WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.